Rasterbar libtorrent: Directory traversal — GLSA 200907-14

A directory traversal vulnerability in Rasterbar libtorrent might allow a remote attacker to overwrite arbitrary files.

Affected packages

net-libs/rb_libtorrent on all architectures
Affected versions < 0.13-r1
Unaffected versions >= 0.13-r1
net-p2p/deluge on all architectures
Affected versions < 1.1.9
Unaffected versions >= 1.1.9

Background

Rasterbar libtorrent is a C++ BitTorrent implementation focusing on efficiency and scalability. Deluge is a BitTorrent client that ships a copy of libtorrent.

Description

census reported a directory traversal vulnerability in src/torrent_info.cpp that can be triggered via .torrent files.

Impact

A remote attacker could entice a user or automated system using Rasterbar libtorrent to load a specially crafted BitTorrent file to create or overwrite arbitrary files using dot dot sequences in filenames.

Workaround

There is no known workaround at this time.

Resolution

All Rasterbar libtorrent users should upgrade to the latest version:

 # emerge --sync
 # emerge --ask --oneshot --verbose ">=net-libs/rb_libtorrent-0.13-r1"

All Deluge users should upgrade to the latest version:

 # emerge --sync
 # emerge --ask --oneshot --verbose ">=net-p2p/deluge-1.1.9"

References

Release date
July 17, 2009

Latest revision
July 17, 2009: 01

Severity
normal

Exploitable
remote

Bugzilla entries